shoyo / acoustic-keyloggerLinks
Pipeline of a keylogging attack using just an audio signal and unsupervised learning.
☆152Updated 2 years ago
Alternatives and similar repositories for acoustic-keylogger
Users that are interested in acoustic-keylogger are comparing it to the libraries listed below
Sorting:
- GIF displaying its own MD5 (hashquine)☆77Updated 5 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆113Updated 11 months ago
- Hash identification program.☆154Updated 3 years ago
- Let's brute force this hotel's tv.☆82Updated 5 years ago
- ☆523Updated 8 months ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- Recovers pixelized text from images☆194Updated 3 years ago
- "Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles☆347Updated last year
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆303Updated 5 years ago
- Apple geolocation services reverse engineering. Database scraper.☆64Updated 2 years ago
- Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻☆200Updated 2 years ago
- Freedom Shield was developed to protect the rights of individuals to peaceably assemble and petition their government.☆78Updated 5 years ago
- Figlet fonts for crimes☆46Updated last year
- ☆128Updated 2 years ago
- List of the tools and usage☆234Updated 2 months ago
- Simple steganography program based on the LSB method.☆126Updated 2 years ago
- A targeted DNS cache poisoner☆121Updated 2 years ago
- Scripts and more for the Wyze camera☆87Updated 5 years ago
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆604Updated last month
- A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers…☆289Updated last year
- ☆230Updated 2 years ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆71Updated 2 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 5 months ago
- SkySafe Miscellaneous Reverse Engineering Blog☆765Updated last year
- Use random bot scanning the internet to seed a Conways Game of Life running on a small LCD on my desk☆40Updated 4 years ago
- A rainbow table implementation for non-uniform inputs, such as phone numbers.☆26Updated 3 years ago
- CrackStation.net's Lookup Table Implementation.☆391Updated 6 years ago
- Rainbow table generation & lookup tools. Make Rainbow Tables Great Again!☆206Updated 4 years ago
- Using Telegram's "People Nearby" feature to pinpoint people (technically) around the globe☆86Updated 4 years ago
- azdecrypt is a fast and powerful hillclimbing classical cipher solver written in freebasic☆122Updated 6 months ago